ID

VAR-201607-0235


CVE

CVE-2016-5131


TITLE

Google Chrome Used in libxml2 Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-004004

DESCRIPTION

Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function. Supplementary information : CWE Vulnerability type by CWE-416: Use After Free ( Use of freed memory ) Has been identified. Google Chrome is a web browser developed by Google (Google). A use-after-free vulnerability exists in libxml2 2.9.4 and earlier versions used in Google Chrome versions earlier than 52.0.2743.82. CVE-2016-1704 The chrome development team found and fixed various issues during internal auditing. CVE-2016-1705 The chrome development team found and fixed various issues during internal auditing. CVE-2016-1706 Pinkie Pie discovered a way to escape the Pepper Plugin API sandbox. CVE-2016-1709 ChenQin a buffer overflow issue in the sfntly library. CVE-2016-5128 A same-origin bypass issue was discovered in the v8 javascript library. CVE-2016-5132 Ben Kelly discovered a same-origin bypass. CVE-2016-5137 Xiaoyin Liu discovered a way to discover whether an HSTS web side had been visited. For the stable distribution (jessie), these problems have been fixed in version 52.0.2743.82-1~deb8u1. For the testing (stretch) and unstable (sid) distributions, these problems have been fixed in version 52.0.2743.82-1. We recommend that you upgrade your chromium-browser packages. Background ========== libxml2 is the XML (eXtended Markup Language) C parser and toolkit initially developed for the Gnome project. ========================================================================= Ubuntu Security Notice USN-3041-1 August 05, 2016 oxide-qt vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Several security issues were fixed in Oxide. Software Description: - oxide-qt: Web browser engine for Qt (QML plugin) Details: Multiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service (application crash) or execute arbitrary code. (CVE-2016-1705) It was discovered that the PPAPI implementation does not validate the origin of IPC messages to the plugin broker process. A remote attacker could potentially exploit this to bypass sandbox protection mechanisms. (CVE-2016-1706) It was discovered that Blink does not prevent window creation by a deferred frame. A remote attacker could potentially exploit this to bypas s same origin restrictions. (CVE-2016-1710) It was discovered that Blink does not disable frame navigation during a detach operation on a DocumentLoader object. A remote attacker could potentially exploit this to bypass same origin restrictions. (CVE-2016-1711) A use-after-free was discovered in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploi t this to cause a denial of service via renderer process crash, or execute arbitrary code. (CVE-2016-5127) It was discovered that objects.cc in V8 does not prevent API interceptors from modifying a store target without setting a property. A remote attacker could potentially exploit this to bypass same origin restrictions. (CVE-2016-5128) A memory corruption was discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploi t this to cause a denial of service via renderer process crash, or execute arbitrary code. (CVE-2016-5129) A security issue was discovered in Chromium. A remote attacker could potentially exploit this to spoof the currently displayed URL. (CVE-2016-5130) A use-after-free was discovered in libxml. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploi t this to cause a denial of service via renderer process crash, or execute arbitrary code. (CVE-2016-5131) The Service Workers implementation in Chromium does not properly implemen t the Secure Contexts specification during decisions about whether to control a subframe. A remote attacker could potentially exploit this to bypass same origin restrictions. (CVE-2016-5132) It was discovered that Chromium mishandles origin information during prox y authentication. A man-in-the-middle attacker could potentially exploit th is to spoof a proxy authentication login prompt. (CVE-2016-5133) It was discovered that the Proxy Auto-Config (PAC) feature in Chromium does not ensure that URL information is restricted to a scheme, host and port. A remote attacker could potentially exploit this to obtain sensitiv e information. (CVE-2016-5134) It was discovered that Blink does not consider referrer-policy informatio n inside an HTML document during a preload request. A remote attacker could potentially exploit this to bypass Content Security Policy (CSP) protections. (CVE-2016-5135) It was discovered that the Content Security Policy (CSP) implementation i n Blink does not apply http :80 policies to https :443 URLs. A remote attacker could potentially exploit this to determine whether a specific HSTS web site has been visited by reading a CSP report. (CVE-2016-5137) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: liboxideqtcore0 1.16.5-0ubuntu0.16.04.1 Ubuntu 14.04 LTS: liboxideqtcore0 1.16.5-0ubuntu0.14.04.1 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: libxml2 security update Advisory ID: RHSA-2020:1190-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:1190 Issue date: 2020-03-31 CVE Names: CVE-2015-8035 CVE-2016-5131 CVE-2017-15412 CVE-2017-18258 CVE-2018-14404 CVE-2018-14567 ==================================================================== 1. Summary: An update for libxml2 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Use after free triggered by XPointer paths beginning with range-to (CVE-2016-5131) * libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c (CVE-2017-15412) * libxml2: DoS caused by incorrect error detection during XZ decompression (CVE-2015-8035) * libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c (CVE-2018-14404) * libxml2: Unrestricted memory usage in xz_head() function in xzlib.c (CVE-2017-18258) * libxml2: Infinite loop caused by incorrect error detection during LZMA decompression (CVE-2018-14567) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The desktop must be restarted (log out, then log back in) for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1277146 - CVE-2015-8035 libxml2: DoS caused by incorrect error detection during XZ decompression 1358641 - CVE-2016-5131 libxml2: Use after free triggered by XPointer paths beginning with range-to 1523128 - CVE-2017-15412 libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c 1566749 - CVE-2017-18258 libxml2: Unrestricted memory usage in xz_head() function in xzlib.c 1595985 - CVE-2018-14404 libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c 1619875 - CVE-2018-14567 libxml2: Infinite loop caused by incorrect error detection during LZMA decompression 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libxml2-2.9.1-6.el7.4.src.rpm x86_64: libxml2-2.9.1-6.el7.4.i686.rpm libxml2-2.9.1-6.el7.4.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-python-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-devel-2.9.1-6.el7.4.i686.rpm libxml2-devel-2.9.1-6.el7.4.x86_64.rpm libxml2-static-2.9.1-6.el7.4.i686.rpm libxml2-static-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libxml2-2.9.1-6.el7.4.src.rpm x86_64: libxml2-2.9.1-6.el7.4.i686.rpm libxml2-2.9.1-6.el7.4.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-python-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-devel-2.9.1-6.el7.4.i686.rpm libxml2-devel-2.9.1-6.el7.4.x86_64.rpm libxml2-static-2.9.1-6.el7.4.i686.rpm libxml2-static-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libxml2-2.9.1-6.el7.4.src.rpm ppc64: libxml2-2.9.1-6.el7.4.ppc.rpm libxml2-2.9.1-6.el7.4.ppc64.rpm libxml2-debuginfo-2.9.1-6.el7.4.ppc.rpm libxml2-debuginfo-2.9.1-6.el7.4.ppc64.rpm libxml2-devel-2.9.1-6.el7.4.ppc.rpm libxml2-devel-2.9.1-6.el7.4.ppc64.rpm libxml2-python-2.9.1-6.el7.4.ppc64.rpm ppc64le: libxml2-2.9.1-6.el7.4.ppc64le.rpm libxml2-debuginfo-2.9.1-6.el7.4.ppc64le.rpm libxml2-devel-2.9.1-6.el7.4.ppc64le.rpm libxml2-python-2.9.1-6.el7.4.ppc64le.rpm s390x: libxml2-2.9.1-6.el7.4.s390.rpm libxml2-2.9.1-6.el7.4.s390x.rpm libxml2-debuginfo-2.9.1-6.el7.4.s390.rpm libxml2-debuginfo-2.9.1-6.el7.4.s390x.rpm libxml2-devel-2.9.1-6.el7.4.s390.rpm libxml2-devel-2.9.1-6.el7.4.s390x.rpm libxml2-python-2.9.1-6.el7.4.s390x.rpm x86_64: libxml2-2.9.1-6.el7.4.i686.rpm libxml2-2.9.1-6.el7.4.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-devel-2.9.1-6.el7.4.i686.rpm libxml2-devel-2.9.1-6.el7.4.x86_64.rpm libxml2-python-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: libxml2-debuginfo-2.9.1-6.el7.4.ppc.rpm libxml2-debuginfo-2.9.1-6.el7.4.ppc64.rpm libxml2-static-2.9.1-6.el7.4.ppc.rpm libxml2-static-2.9.1-6.el7.4.ppc64.rpm ppc64le: libxml2-debuginfo-2.9.1-6.el7.4.ppc64le.rpm libxml2-static-2.9.1-6.el7.4.ppc64le.rpm s390x: libxml2-debuginfo-2.9.1-6.el7.4.s390.rpm libxml2-debuginfo-2.9.1-6.el7.4.s390x.rpm libxml2-static-2.9.1-6.el7.4.s390.rpm libxml2-static-2.9.1-6.el7.4.s390x.rpm x86_64: libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-static-2.9.1-6.el7.4.i686.rpm libxml2-static-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libxml2-2.9.1-6.el7.4.src.rpm x86_64: libxml2-2.9.1-6.el7.4.i686.rpm libxml2-2.9.1-6.el7.4.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-devel-2.9.1-6.el7.4.i686.rpm libxml2-devel-2.9.1-6.el7.4.x86_64.rpm libxml2-python-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-static-2.9.1-6.el7.4.i686.rpm libxml2-static-2.9.1-6.el7.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8035 https://access.redhat.com/security/cve/CVE-2016-5131 https://access.redhat.com/security/cve/CVE-2017-15412 https://access.redhat.com/security/cve/CVE-2017-18258 https://access.redhat.com/security/cve/CVE-2018-14404 https://access.redhat.com/security/cve/CVE-2018-14567 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXoOdR9zjgjWX9erEAQhgbQ/+JolcknqNffv7HQZNxYOtS/M2Zx/E3IB4 QwmkXhfmgV44ig4prUpghE/+O5eTUPjqSq6rHjih/pjCjG4bVcK6BptxBFi7WQwo GM0ryvm0p0fib0dy+Ov3NNC6Dhg32NIVwC0pWTIEdYcOGBfDY3mXlLXx5aHefisu p1C7F6rP4xxMRDOlQhAB4UPMkPSD/MtKIyxIEqiAT5olybSTl0um2AB5XtLlCbkT h4IXDsAyswvBIS/bxnyZkn6oHEiD3JBwcP+ZU0jgSEy34O92ttV7hRQb1H1+YHOO li1bX5IcbmFzATwBfCZQmNfrp/XU4Ra28GT/3JGntnhhxFmz1xe/h5YNJTwZ+0TX yxKZdAz3brm/mt6uvbY4PpGERyA+X/Moz4ToXCEL2jVfSXbOuajRtCV8Cp3X7bCd Ed2imuXZQPpUXNVdF73RJ7YB6vEhQRIdlKgEXzPPpuHFH1HprvSLoJyrDD1T8bfx TVrrmvtWKtXq0DYSD7wGw23WZJJeUIgyKiZNTlIxvb0c7r8+aZ+toY07sZlBkTCA cjWNRnHDNkdYH2ZoNPQlzYzk5rSYGqhoOvF85pNCY4v4fofyMEnyAY7MEZ/Z991X Ko2ShKSzEtKSMcx2B2wPg+hFcACP8HbKxSbW3SzoCSKCOGEAPLQlJ5eHXwLOAO3Q IZIK7xZywNw=8RZh -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . (CVE-2016-4448) It was discovered that libxml2 incorrectly handled certain malformed documents. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201610-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Chromium: Multiple vulnerabilities Date: October 29, 2016 Bugs: #589278, #590420, #592630, #593708, #595614, #597016 ID: 201610-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in the Chromium web browser, the worst of which allows remote attackers to execute arbitrary code. Background ========== Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-54.0.2840.59" References ========== [ 1 ] CVE-2016-5127 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5127 [ 2 ] CVE-2016-5128 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5128 [ 3 ] CVE-2016-5129 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5129 [ 4 ] CVE-2016-5130 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5130 [ 5 ] CVE-2016-5131 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5131 [ 6 ] CVE-2016-5132 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5132 [ 7 ] CVE-2016-5133 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5133 [ 8 ] CVE-2016-5134 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5134 [ 9 ] CVE-2016-5135 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5135 [ 10 ] CVE-2016-5136 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5136 [ 11 ] CVE-2016-5137 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5137 [ 12 ] CVE-2016-5138 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5138 [ 13 ] CVE-2016-5139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5139 [ 14 ] CVE-2016-5140 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5140 [ 15 ] CVE-2016-5141 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5141 [ 16 ] CVE-2016-5142 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5142 [ 17 ] CVE-2016-5143 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5143 [ 18 ] CVE-2016-5144 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5144 [ 19 ] CVE-2016-5145 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5145 [ 20 ] CVE-2016-5146 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5146 [ 21 ] CVE-2016-5147 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5147 [ 22 ] CVE-2016-5148 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5148 [ 23 ] CVE-2016-5149 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5149 [ 24 ] CVE-2016-5150 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5150 [ 25 ] CVE-2016-5151 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5151 [ 26 ] CVE-2016-5152 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5152 [ 27 ] CVE-2016-5153 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5153 [ 28 ] CVE-2016-5154 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5154 [ 29 ] CVE-2016-5155 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5155 [ 30 ] CVE-2016-5156 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5156 [ 31 ] CVE-2016-5157 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5157 [ 32 ] CVE-2016-5158 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5158 [ 33 ] CVE-2016-5159 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5159 [ 34 ] CVE-2016-5160 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5160 [ 35 ] CVE-2016-5161 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5161 [ 36 ] CVE-2016-5162 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5162 [ 37 ] CVE-2016-5163 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5163 [ 38 ] CVE-2016-5164 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5164 [ 39 ] CVE-2016-5165 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5165 [ 40 ] CVE-2016-5166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5166 [ 41 ] CVE-2016-5167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5167 [ 42 ] CVE-2016-5170 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5170 [ 43 ] CVE-2016-5171 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5171 [ 44 ] CVE-2016-5172 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5172 [ 45 ] CVE-2016-5173 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5173 [ 46 ] CVE-2016-5174 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5174 [ 47 ] CVE-2016-5175 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5175 [ 48 ] CVE-2016-5177 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5177 [ 49 ] CVE-2016-5178 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5178 [ 50 ] CVE-2016-5181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5181 [ 51 ] CVE-2016-5182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5182 [ 52 ] CVE-2016-5183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5183 [ 53 ] CVE-2016-5184 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5184 [ 54 ] CVE-2016-5185 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5185 [ 55 ] CVE-2016-5186 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5186 [ 56 ] CVE-2016-5187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5187 [ 57 ] CVE-2016-5188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5188 [ 58 ] CVE-2016-5189 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5189 [ 59 ] CVE-2016-5190 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5190 [ 60 ] CVE-2016-5191 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5191 [ 61 ] CVE-2016-5192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5192 [ 62 ] CVE-2016-5193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5193 [ 63 ] CVE-2016-5194 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5194 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201610-09 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . 6) - i386, x86_64 3. This update upgrades Chromium to version 52.0.2743.82. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. (CVE-2016-1706, CVE-2016-1708, CVE-2016-1709, CVE-2016-1710, CVE-2016-1711, CVE-2016-5127, CVE-2016-5128, CVE-2016-5129, CVE-2016-5130, CVE-2016-5131, CVE-2016-5132, CVE-2016-5133, CVE-2016-5134, CVE-2016-5135, CVE-2016-5136, CVE-2016-5137, CVE-2016-1705) 4. Bugs fixed (https://bugzilla.redhat.com/): 1358630 - CVE-2016-1706 chromium-browser: sandbox escape in ppapi 1358632 - CVE-2016-1708 chromium-browser: use-after-free in extensions 1358633 - CVE-2016-1709 chromium-browser: heap-buffer-overflow in sfntly 1358634 - CVE-2016-1710 chromium-browser: same-origin bypass in blink 1358636 - CVE-2016-1711 chromium-browser: same-origin bypass in blink 1358637 - CVE-2016-5127 chromium-browser: use-after-free in blink 1358638 - CVE-2016-5128 chromium-browser: same-origin bypass in v8 1358639 - CVE-2016-5129 chromium-browser: memory corruption in v8 1358640 - CVE-2016-5130 chromium-browser: url spoofing 1358641 - CVE-2016-5131 chromium-browser: use-after-free in libxml 1358642 - CVE-2016-5132 chromium-browser: limited same-origin bypass in service workers 1358643 - CVE-2016-5133 chromium-browser: origin confusion in proxy authentication 1358645 - CVE-2016-5134 chromium-browser: url leakage via pac script 1358646 - CVE-2016-5135 chromium-browser: content-security-policy bypass 1358647 - CVE-2016-5136 chromium-browser: use after free in extensions 1358648 - CVE-2016-5137 chromium-browser: history sniffing with hsts and csp 1358649 - CVE-2016-1705 chromium-browser: various fixes from internal audits 6

Trust: 2.43

sources: NVD: CVE-2016-5131 // JVNDB: JVNDB-2016-004004 // VULHUB: VHN-93950 // VULMON: CVE-2016-5131 // PACKETSTORM: 138122 // PACKETSTORM: 140533 // PACKETSTORM: 138182 // PACKETSTORM: 157021 // PACKETSTORM: 141667 // PACKETSTORM: 139376 // PACKETSTORM: 138054

AFFECTED PRODUCTS

vendor:googlemodel:chromescope:ltversion:52.0.2743.82

Trust: 1.8

vendor:xmlsoftmodel:libxml2scope:lteversion:2.9.4

Trust: 1.8

vendor:applemodel:mac os xscope:eqversion:10.11.6

Trust: 1.4

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:10.0

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:3.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:10.0

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.12

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:42.1

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:susemodel:linux enterprisescope:eqversion:12.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:applemodel:iosscope:ltversion:10 (ipad first 4 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:10 (iphone 5 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:10 (ipod touch first 6 after generation )

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:10 (apple tv first 4 generation )

Trust: 0.8

vendor:applemodel:watchosscope:ltversion:3 (apple watch all models )

Trust: 0.8

vendor:applemodel:tvscope:eqversion:9.2.2

Trust: 0.6

vendor:applemodel:watch osscope:eqversion:2.2.2

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:9.3.5

Trust: 0.6

sources: CNNVD: CNNVD-201607-919 // JVNDB: JVNDB-2016-004004 // NVD: CVE-2016-5131

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5131
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2016-5131
value: HIGH

Trust: 1.0

NVD: CVE-2016-5131
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201607-919
value: HIGH

Trust: 0.6

VULHUB: VHN-93950
value: MEDIUM

Trust: 0.1

VULMON: CVE-2016-5131
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-5131
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-93950
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-5131
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2016-5131
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-93950 // VULMON: CVE-2016-5131 // CNNVD: CNNVD-201607-919 // JVNDB: JVNDB-2016-004004 // NVD: CVE-2016-5131 // NVD: CVE-2016-5131

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-93950 // JVNDB: JVNDB-2016-004004 // NVD: CVE-2016-5131

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 138182 // PACKETSTORM: 139376 // CNNVD: CNNVD-201607-919

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201607-919

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004004

PATCH

title:APPLE-SA-2016-09-20-6 tvOS 10url:http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html

Trust: 0.8

title:APPLE-SA-2016-09-20 macOS Sierra 10.12url:http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html

Trust: 0.8

title:APPLE-SA-2016-09-20-3 iOS 10url:http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html

Trust: 0.8

title:APPLE-SA-2016-09-20-5 watchOS 3url:http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html

Trust: 0.8

title:HT207141url:https://support.apple.com/en-us/HT207141

Trust: 0.8

title:HT207142url:https://support.apple.com/en-us/HT207142

Trust: 0.8

title:HT207143url:https://support.apple.com/en-us/HT207143

Trust: 0.8

title:HT207170url:https://support.apple.com/en-us/HT207170

Trust: 0.8

title:HT207141url:https://support.apple.com/ja-jp/HT207141

Trust: 0.8

title:HT207170url:https://support.apple.com/ja-jp/HT207170

Trust: 0.8

title:HT207142url:https://support.apple.com/ja-jp/HT207142

Trust: 0.8

title:HT207143url:https://support.apple.com/ja-jp/HT207143

Trust: 0.8

title:Issue 2127493002url:https://codereview.chromium.org/2127493002

Trust: 0.8

title:Google Chromeurl:https://www.google.com/intl/ja/chrome/browser/features.html

Trust: 0.8

title:Stable Channel Updateurl:http://googlechromereleases.blogspot.jp/2016/07/stable-channel-update.html

Trust: 0.8

title:Bug 1358641url:https://bugzilla.redhat.com/show_bug.cgi?id=1358641

Trust: 0.8

title:Top Pageurl:http://www.xmlsoft.org/

Trust: 0.8

title:Google Chrome libxml2 Remediation measures for reusing vulnerabilities after releaseurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=63279

Trust: 0.6

title:Red Hat: Moderate: libxml2 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20201190 - Security Advisory

Trust: 0.1

title:IBM: Security Bulletin: IBM App Connect Enterprise Certified Container may be vulnerable to arbitrary code execution and denial of service due to CVE-2017-15412 and CVE-2016-5131url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=eafa647f9fc3bb9f8229531c9119b24a

Trust: 0.1

title:Debian CVElist Bug Report Logs: libxml2: CVE-2016-4658url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=875827e87aed79825801cf0c7dbfb4a3

Trust: 0.1

title:Ubuntu Security Notice: libxml2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3235-1

Trust: 0.1

title:Debian CVElist Bug Report Logs: libxml2: CVE-2016-5131url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=9f32dd31cb36cd4b73309a01754e5056

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2016-5131

Trust: 0.1

title:Arch Linux Advisories: [ASA-201611-2] libxml2: arbitrary code executionurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201611-2

Trust: 0.1

title:Amazon Linux 2: ALAS2-2020-1466url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1466

Trust: 0.1

title:Amazon Linux AMI: ALAS-2020-1415url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2020-1415

Trust: 0.1

title:Ubuntu Security Notice: oxide-qt vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3041-1

Trust: 0.1

title:Debian Security Advisories: DSA-3637-1 chromium-browser -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=eefbda06bd525a710a6c341dda9680c9

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182486 - Security Advisory

Trust: 0.1

title:Android Security Bulletins: Android Security Bulletin—June 2017url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=f9fbdf3aea1fd17035e18f77d6530ab1

Trust: 0.1

title:Android Security Bulletins: Android Security Bulletin—May 2017url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=473019536b98d5c3b462c97d8bdb8384

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title:aws_inspector_parserurl:https://github.com/0xfabiof/aws_inspector_parser

Trust: 0.1

title:afl-cveurl:https://github.com/mrash/afl-cve

Trust: 0.1

title: - url:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

title:Threatposturl:https://threatpost.com/google-fixes-sandbox-escape-in-chrome-again/119428/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/google/google-chrome-52-0-2743-82-released-with-48-security-fixes/

Trust: 0.1

sources: VULMON: CVE-2016-5131 // CNNVD: CNNVD-201607-919 // JVNDB: JVNDB-2016-004004

EXTERNAL IDS

db:NVDid:CVE-2016-5131

Trust: 3.3

db:SECTRACKid:1038623

Trust: 1.8

db:SECTRACKid:1036428

Trust: 1.8

db:BIDid:92053

Trust: 1.8

db:JVNid:JVNVU93841436

Trust: 0.8

db:JVNid:JVNVU90950877

Trust: 0.8

db:JVNDBid:JVNDB-2016-004004

Trust: 0.8

db:CNNVDid:CNNVD-201607-919

Trust: 0.7

db:AUSCERTid:ESB-2020.2200

Trust: 0.6

db:AUSCERTid:ESB-2023.3732

Trust: 0.6

db:VULHUBid:VHN-93950

Trust: 0.1

db:VULMONid:CVE-2016-5131

Trust: 0.1

db:PACKETSTORMid:138122

Trust: 0.1

db:PACKETSTORMid:140533

Trust: 0.1

db:PACKETSTORMid:138182

Trust: 0.1

db:PACKETSTORMid:157021

Trust: 0.1

db:PACKETSTORMid:141667

Trust: 0.1

db:PACKETSTORMid:139376

Trust: 0.1

db:PACKETSTORMid:138054

Trust: 0.1

sources: VULHUB: VHN-93950 // VULMON: CVE-2016-5131 // PACKETSTORM: 138122 // PACKETSTORM: 140533 // PACKETSTORM: 138182 // PACKETSTORM: 157021 // PACKETSTORM: 141667 // PACKETSTORM: 139376 // PACKETSTORM: 138054 // CNNVD: CNNVD-201607-919 // JVNDB: JVNDB-2016-004004 // NVD: CVE-2016-5131

REFERENCES

url:http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html

Trust: 1.9

url:https://security.gentoo.org/glsa/201610-09

Trust: 1.9

url:https://security.gentoo.org/glsa/201701-37

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2016-1485.html

Trust: 1.9

url:http://www.ubuntu.com/usn/usn-3041-1

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2016/sep/msg00006.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2016/sep/msg00008.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2016/sep/msg00010.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2016/sep/msg00011.html

Trust: 1.8

url:http://www.securityfocus.com/bid/92053

Trust: 1.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=1358641

Trust: 1.8

url:https://codereview.chromium.org/2127493002

Trust: 1.8

url:https://crbug.com/623378

Trust: 1.8

url:https://source.android.com/security/bulletin/2017-05-01

Trust: 1.8

url:https://support.apple.com/ht207141

Trust: 1.8

url:https://support.apple.com/ht207142

Trust: 1.8

url:https://support.apple.com/ht207143

Trust: 1.8

url:https://support.apple.com/ht207170

Trust: 1.8

url:http://www.debian.org/security/2016/dsa-3637

Trust: 1.8

url:http://www.securitytracker.com/id/1036428

Trust: 1.8

url:http://www.securitytracker.com/id/1038623

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5131

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90950877/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu93841436/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5131

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-5131

Trust: 0.7

url:https://www.auscert.org.au/bulletins/esb-2023.3732

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-network-security-is-affected-by-multiple-vulnerabilities/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2200/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2016-5130

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-5127

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-5133

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-5137

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-5132

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-5129

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-5134

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-5128

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-5135

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-1706

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-1705

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-1710

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-1711

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-5136

Trust: 0.3

url:https://access.redhat.com/errata/rhsa-2020:1190

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-1708

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-1709

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5131

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-8035

Trust: 0.2

url:https://security.gentoo.org/

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4658

Trust: 0.2

url:https://bugs.gentoo.org.

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-5131

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/3235-1/

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=47177

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1704

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1707

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-3705

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1840

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3705

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-3627

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1819

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7942

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7499

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1839

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2073

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7499

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1836

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1839

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8242

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2073

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5312

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7498

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7941

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7942

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3627

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8035

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7500

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5312

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7498

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7500

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7941

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1819

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7497

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8242

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4658

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7497

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/oxide-qt/1.16.5-0ubuntu0.16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/oxide-qt/1.16.5-0ubuntu0.14.04.1

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-15412

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14404

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-15412

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14404

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14567

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18258

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8035

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.7.8.dfsg-5.1ubuntu4.17

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.9.1+dfsg1-3ubuntu4.9

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-3235-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.9.3+dfsg1-1ubuntu0.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4448

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.9.4+dfsg1-2ubuntu0.1

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5147

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5129

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5153

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5135

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5150

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5139

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5186

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5145

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5138

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5142

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5172

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5167

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5190

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5140

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5171

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5161

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5146

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5154

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5144

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5178

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5189

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5145

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5192

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5187

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5140

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5157

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5150

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5136

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5142

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5165

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5182

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5181

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5141

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5154

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5151

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5156

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5143

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5159

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5191

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5148

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5185

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5183

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5160

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5177

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5128

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5152

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5184

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5143

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5162

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5173

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5132

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5144

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5158

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5151

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5141

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5163

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5174

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5130

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5188

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5170

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5133

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5155

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5175

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5152

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5147

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5193

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5164

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5166

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5148

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5138

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5139

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5146

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5137

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5134

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1710

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5135

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1706

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5133

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5130

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1708

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5129

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1711

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5136

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1705

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5128

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5127

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1709

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5132

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5137

Trust: 0.1

sources: VULHUB: VHN-93950 // VULMON: CVE-2016-5131 // PACKETSTORM: 138122 // PACKETSTORM: 140533 // PACKETSTORM: 138182 // PACKETSTORM: 157021 // PACKETSTORM: 141667 // PACKETSTORM: 139376 // PACKETSTORM: 138054 // CNNVD: CNNVD-201607-919 // JVNDB: JVNDB-2016-004004 // NVD: CVE-2016-5131

CREDITS

Gentoo

Trust: 0.2

sources: PACKETSTORM: 140533 // PACKETSTORM: 139376

SOURCES

db:VULHUBid:VHN-93950
db:VULMONid:CVE-2016-5131
db:PACKETSTORMid:138122
db:PACKETSTORMid:140533
db:PACKETSTORMid:138182
db:PACKETSTORMid:157021
db:PACKETSTORMid:141667
db:PACKETSTORMid:139376
db:PACKETSTORMid:138054
db:CNNVDid:CNNVD-201607-919
db:JVNDBid:JVNDB-2016-004004
db:NVDid:CVE-2016-5131

LAST UPDATE DATE

2026-02-07T22:37:13.891000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-93950date:2019-03-26T00:00:00
db:VULMONid:CVE-2016-5131date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-201607-919date:2023-06-30T00:00:00
db:JVNDBid:JVNDB-2016-004004date:2016-10-07T00:00:00
db:NVDid:CVE-2016-5131date:2025-12-04T17:15:49.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-93950date:2016-07-23T00:00:00
db:VULMONid:CVE-2016-5131date:2016-07-23T00:00:00
db:PACKETSTORMid:138122date:2016-08-01T11:11:00
db:PACKETSTORMid:140533date:2017-01-17T02:26:10
db:PACKETSTORMid:138182date:2016-08-05T22:47:06
db:PACKETSTORMid:157021date:2020-04-01T15:13:56
db:PACKETSTORMid:141667date:2017-03-16T23:37:18
db:PACKETSTORMid:139376date:2016-10-29T13:13:00
db:PACKETSTORMid:138054date:2016-07-26T17:22:00
db:CNNVDid:CNNVD-201607-919date:2016-07-26T00:00:00
db:JVNDBid:JVNDB-2016-004004date:2016-07-28T00:00:00
db:NVDid:CVE-2016-5131date:2016-07-23T19:59:13.767